• Title/Summary/Keyword: 네트워크 위험도

Search Result 705, Processing Time 0.021 seconds

An Exploratory Study on Security Threats of Smartwork Environment (스마트워크 환경에서의 보안 위협에 관한 탐색적 연구)

  • Ra, Jong-Hei;Choi, Young-Jin;Shin, Dong-Ik
    • Journal of Information Technology and Architecture
    • /
    • v.9 no.1
    • /
    • pp.33-42
    • /
    • 2012
  • Present many organizations are introduced to smartwork for reducing the operational cost and getting the labor's flexibility. The smartwork is the future-oriented worker's environment in which they can engage in their task, anytime and anywhere conveniently and efficiently. In spite of many smartwork advantages, the security problems are major issues and prevent to introducing and spreading of smartwork for organizations. Therefore, the success of the organization for smartwork environment is put in place appropriate security control model. This study is about security threats for smartwork security control model. We apply the exploratory method for this research, which are reviewing, analyzing of literature for extracting the security threats and clustering of the extracted security threats. Finally we define the 16's security threats according to the aspect of smartwork service layers.

The IOA-Based Intelligent Information Protection System for Response of Advanced Persistent Threats (IOA 기반의 지능형지속위협 대응 위한 지능형 정보보호시스템)

  • Ryu, Chang-su
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.20 no.11
    • /
    • pp.2067-2072
    • /
    • 2016
  • Recently, due to the development of attack techniques that can circumvent existing information protection systems, continuous threats in a form unrecognized by the user have threatened information assets. Therefore, it is necessary to support the prompt responses to anticipated attempts of APT attacks, bypass access attacks, and encryption packet attacks, which the existing systems have difficulty defending against through a single response, and to continuously monitor information protection systems with a defense strategy based on Indicators of Attack (IOA). In this paper, I suggest a centralized intelligent information protection system to support the intelligent response to a violation by discerning important assets through prevention control in a performance impact assessment about information properties in order to block the attack routes of APT; establishing information control policies through weakness/risk analyses in order to remove the risks in advance; establishing detection control by restricting interior/exterior bypass networks to server access and monitoring encrypted communications; and lastly, performing related corrective control through backup/restoration.

A Study on the Advancement of Domestic Logistics Enterprises to the Specialty Logistics Market in accordance with Changes in the Logistics Industry (물류산업 변화에 따른 국내 물류기업의 특화 물류시장 진출에 관한 연구)

  • Shin, Seok-hyun
    • Journal of Korea Port Economic Association
    • /
    • v.37 no.2
    • /
    • pp.55-71
    • /
    • 2021
  • While major alliance container carriers in the post-corona era are enjoying the largest boom in history with their fleet reduction strategy, shippers companies are in a state of deteriorating import and export price competitiveness due to increased logistics costs, and forwarders who act for shipping companies' logistics services are also experiencing the burden of rising freight rates It is in a state of overheated competition and worsening profits for attracting shippers. For this purpose, research data, literature studies, statistical data and data from overseas specialized networks were used as prior research. Online surveys and telephone interviews were conducted, and as a result, four areas of cold chain (including perishable cargo), project logistics, UN procurement logistics, and dangerous goods logistics, which were found to be particularly in high demand, were analyzed to suggest entry strategies.

A Study on the Safety Monitoring of Bridge Facilities based on Smart Sensors (스마트 센서 기반의 교량 시설물 안전 모니터링 기법 연구)

  • YEON, Sang-Ho;KIM, Joon-Soo;YEON, Chun-Hum
    • Journal of the Korean Association of Geographic Information Studies
    • /
    • v.22 no.2
    • /
    • pp.97-106
    • /
    • 2019
  • Today, many smart sensor's measurement instruments are used to check the safety situation of various medium and large bridge structures that should be maintained in the construction facilities, but most of them use the method of measuring and confirming the displacement behavior of the bridge at regular intervals. In order to continuously check the safety situation, various measuring instruments are used, but most of them are not able to measure and measure the displacement and behavior of main construction structures at regular intervals. In this study, GNSS and environment smart sensors and drone's image data are transmitted to wireless network so that risk of many bridge's structures can be detected beforehand. As a result, by diagnosing the fine displacement of the bridge in real time and its condition, reinforcement, repair and disaster prevention measures for the structural parts of the bridges, which are expected to be dangerous, and various disasters and accidents can be prevented, and disaster can be prevented could suggest a new alternative.

Web Server Hacking and Security Risk using DNS Spoofing and Pharming combined Attack (DNS 스푸핑을 이용한 포털 해킹과 파밍의 위험성)

  • Choi, Jae-Won
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.23 no.11
    • /
    • pp.1451-1461
    • /
    • 2019
  • DNS spoofing is an attack in which an attacker intervenes in the communication between client and DNS server to deceive DNS server by responding to a fake IP address rather than actual IP address. It is possible to implement a pharming site that hacks user ID and password by duplicating web server's index page and simple web programming. In this paper we have studied web spoofing attack that combines DNS spoofing and pharming site implementation which leads to farming site. We have studied DNS spoofing attack method, procedure and farming site implementation method for portal server of this university. In the case of Kyungsung Portal, bypassing attack and hacking were possible even though the web server was SSL encrypted and secure authentication. Many web servers do not have security measures, and even web servers secured by SSL can be disabled. So it is necessary that these serious risks are to be informed and countermeasures are to be researched.

AIoT-based High-risk Industrial Safety Management System of Artificial Intelligence (AIoT 기반 고위험 산업안전관리시스템 인공지능 연구)

  • Yeo, Seong-koo;Park, Dea-Woo
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.26 no.9
    • /
    • pp.1272-1278
    • /
    • 2022
  • The government enacted and promulgated the 'Severe Accident Punishment Act' in January 2021 and is implementing this law. However, the number of occupational accidents in 2021 increased by 10.7% compared to the same period of the previous year. Therefore, safety measures are urgently needed in the industrial field. In this study, BLE Mesh networking technology is applied for safety management of high-risk industrial sites with poor communication environment. The complex sensor AIoT device collects gas sensing values, voice and motion values in real time, analyzes the information values through artificial intelligence LSTM algorithm and CNN algorithm, and recognizes dangerous situations and transmits them to the server. The server monitors the transmitted risk information in real time so that immediate relief measures are taken. By applying the AIoT device and safety management system proposed in this study to high-risk industrial sites, it will minimize industrial accidents and contribute to the expansion of the social safety net.

Study on the Development of Truck Traffic Accident Prediction Models and Safety Rating on Expressways (고속도로 화물차 교통사고 건수 예측모형 및 안전등급 개발 연구)

  • Jungeun Yoon;Harim Jeong;Jangho Park;Donghyo Kang;Ilsoo Yun
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.22 no.1
    • /
    • pp.1-15
    • /
    • 2023
  • In this study, the number of truck traffic accidents was predicted by using Poisson and negative binomial regression analysis to understand what factors affect accidents using expressway data. Significant variables in the truck traffic accident prediction model were continuous driving time, link length, truck traffic volume. number of bridges and number of drowsy shelters. The calculated LOSS rating was expressed on the national expressway network to diagnose the risk of truck accidents. This is expected to be used as basic data for policy establishment to reduce truck accidents on expressways.

Efficient Attack Traffic Detection Method for Reducing False Alarms (False Alarm 감축을 위한 효율적인 공격 트래픽 탐지 기법)

  • Choi, Il-Jun;Chu, Byoung-Gyun;Oh, Chang-Suk
    • Journal of the Korea Society of Computer and Information
    • /
    • v.14 no.5
    • /
    • pp.65-75
    • /
    • 2009
  • The development of IT technology, Internet popularity is increasing geometrically. However, as its side effect, the intrusion behaviors such as information leakage for key system and infringement of computation network etc are also increasing fast. The attack traffic detection method which is suggested in this study utilizes the Snort, traditional NIDS, filters the packet with false positive among the detected attack traffics using Nmap information. Then, it performs the secondary filtering using nessus vulnerability information and finally performs correlation analysis considering appropriateness of management system, severity of signature and security hole so that it could reduce false positive alarm message as well as minimize the errors from false positive and as a result, it raised the overall attack detection results.

Development of Offshore Construction ROV System applying Pneumatic Gripper (공압 gripper를 적용한 해양 건설 ROV 시스템 개발)

  • Park, Jihyun;Hwang, Yoseop
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.26 no.11
    • /
    • pp.1697-1705
    • /
    • 2022
  • The safety of marine construction workers and marine pollution problems are occurring due to large-scale offshore construction. In particular, underwater construction work in the sea has a higher risk than other work, so it is necessary to apply an unmanned alternative system that considers the safety of the workers. In this paper, the ROV system for offshore construction has been developed for underwater unmanned work. A monitoring system was developed for position control through the control of underwater propellants, pneumatic gripper, and monitoring of underwater work. As a result of the performance evaluation, the underwater movement speed of the ROV was evaluated to be 0.89 m/s, and it was confirmed that the maximum load of the pneumatic gripper was 80 kg. In addition, the network bandwidth required for underwater ROV control and underwater video streaming was evaluated to be more than 300Mbps, wired communication at 92.7 ~ 95.0Mbit/s at 205m, and wireless communication at 78.3 ~ 84.8Mbit/s.

An Empirical Analysis of Post-Merger Risk Following the M&As of IT Firms (IT 기업의 인수합병 이후 수익율 변동성에 대한 실증 분석)

  • Young Bong Chang;YoungOk Kwon
    • Information Systems Review
    • /
    • v.19 no.4
    • /
    • pp.171-182
    • /
    • 2017
  • Although economic growth has been retarded since the global economic crisis over recent decades, a large number of firms consider mergers and acquisitions (M and A) as a strategy to survive in a highly competitive market. In particular, an increasing number of firms pursue M and A with IT firms in recent years. In this study, we analyze the post-merger risks measured as ROA volatility for acquiring firms when they seek to acquire an IT firm. Our analysis suggests that a firm with prior experience in M and A acquires IT firms aggressively. Moreover, a substantial number of IT firms are relatively small and unlisted when they are acquired. We also show that an acquiring firm's post-merger risk (i.e., ROA volatility) increases after its acquisition of IT firms. However, an increase in post-merger risk is alleviated when relatedness exists between an acquiring firm and target.